Difference between revisions of "Bering-uClibc 6.x - User Guide - Advanced Topics - Special case for the Raspberry PI Zero W"

From bering-uClibc
Jump to: navigation, search
(Special case for the Raspberry PI Zero W)
(Special case for the Raspberry PI Zero W)
Line 36: Line 36:
 
On bootup the /init.d/wpasupplicant startup script will look for this file presence on the boot media, and will copy it's content to /etc/wpasupplicant.conf . The script will then delete the file on the boot media.  
 
On bootup the /init.d/wpasupplicant startup script will look for this file presence on the boot media, and will copy it's content to /etc/wpasupplicant.conf . The script will then delete the file on the boot media.  
  
Wait a few minutes for the PI to load and run, find the PI Zero IP address ( using fing on your phone...) and from a browser type in the suitable URL http://123.456.789 . If faced with password login request, admin:admin should get you there.
+
Wait a few minutes for the PI to load and run, find the PI Zero IP address ( using fing on your phone...) and from a browser type in the suitable URL http://123.456.789 . If faced with a password login request, admin:admin should get you there.

Revision as of 21:32, 18 December 2020

Special case for the Raspberry PI Zero W

If you own a Raspberry PI Zero W you can connect to it using the WIFI interface only, no need for the console access using GPIOs serial pins 14 and 15 with a TTL-serial-USB adapter.

You can obtain a bootable image file https://sourceforge.net/p/leaf/packages/ci/802bb63a523a058489004204ea8b7cab7370aa04/tree/PiZ.img from the LEAF distribution and transfer it to an SD card using dd or the Raspberry PI Imager program on Windows or Mac.

Once the SD card is generated and is still in your PC, open it up and create a file wpa_supplicant.conf in the mmcblk0p1 partition...

The content of the file should be:

# Minimal /etc/wpa_supplicant.conf to associate with open
#  access points. 

# path to UNIX socket control interface
ctrl_interface=/var/run/wpa_supplicant

eapol_version=1
ap_scan=1
fast_reauth=1

### Example of basic WPA-PSK secured AP, uncomment the next 4 lines, add in your own ssid and psk...
#network={
#    ssid="ournet"
#    psk="ourpassword"
#}

### Associate with any open access point
###  Scans/ESSID changes can be done with wpa_cli
network={
        key_mgmt=NONE
}


On bootup the /init.d/wpasupplicant startup script will look for this file presence on the boot media, and will copy it's content to /etc/wpasupplicant.conf . The script will then delete the file on the boot media.

Wait a few minutes for the PI to load and run, find the PI Zero IP address ( using fing on your phone...) and from a browser type in the suitable URL http://123.456.789 . If faced with a password login request, admin:admin should get you there.